Uploaded image for project: 'JDK'
  1. JDK
  2. JDK-8345336

Tests in java/text/Format/DateFormat/ are triggering VM crashes

XMLWordPrintable

    • x86_64
    • windows

      Test: java/text/Format/DateFormat/Bug8141243.java

      case 1:

      #
      # A fatal error has been detected by the Java Runtime Environment:
      #
      # EXCEPTION_ACCESS_VIOLATION (0xc0000005) at pc=0x00007ff90c60a990, pid=34608, tid=22848
      #
      # JRE version: Java(TM) SE Runtime Environment (24.0+27) (build 24-ea+27-3417)
      # Java VM: Java HotSpot(TM) 64-Bit Server VM (24-ea+27-3417, mixed mode, tiered, compressed oops, compressed class ptrs, g1 gc, windows-amd64)
      # Problematic frame:
      # V [jvm.dll+0x6da990] Method::is_method_handle_intrinsic+0x0
      #
      # Core dump will be written. Default location: C:\sb\prod\1733167089\testoutput\test-support\jtreg_open_test_jdk_tier2_part2\scratch\5\hs_err_pid34608.mdmp
      #
      # If you would like to submit a bug report, please visit:
      # https://bugreport.java.com/bugreport/crash.jsp
      #

      --------------- S U M M A R Y ------------

      Command Line: -Xmx768m -XX:MaxRAMPercentage=4.16667 -Dtest.boot.jdk=c:\ade\mesos\work_dir\jib-master\install\jdk\23\37\bundles\windows-x64\jdk-23_windows-x64_bin.zip\jdk-23 -Djava.io.tmpdir=c:\sb\prod\1733167089\testoutput\test-support\jtreg_open_test_jdk_tier2_part2\tmp -XX:+CreateCoredumpOnCrash -ea -esa -Djava.library.path=c:\ade\mesos\work_dir\jib-master\install\jdk-24+27-3417\windows-x64.test\jdk\jtreg\native --patch-module=java.base=C:\sb\prod\1733167089\testoutput\test-support\jtreg_open_test_jdk_tier2_part2\patches\java.base -Djava.security.policy=file:/c:/sb/prod/1733167089/testoutput/test-support/jtreg_open_test_jdk_tier2_part2/jtreg.policy com.sun.javatest.regtest.agent.AgentServer -id 24 -logfile C:\sb\prod\1733167089\testoutput\test-support\jtreg_open_test_jdk_tier2_part2\jtData\agentServer.24.trace -allowSetSecurityManager -port 64468 -timeoutFactor 4.0

      Host: AMD EPYC 7J13 64-Core Processor , 12 cores, 23G, Windows Server 2022 , 64 bit Build 20348 (10.0.20348.2760)
      Time: Mon Dec 2 19:29:16 2024 Etc elapsed time: 146.106918 seconds (0d 0h 2m 26s)

      --------------- T H R E A D ---------------

      Current thread (0x000002b47b14ff10): JavaThread "C1 CompilerThread0" daemon [_thread_in_vm, id=22848, stack(0x000000c5ac500000,0x000000c5ac600000) (1024K)]


      Current CompileTask:
      C1:146107 6853 3 java.lang.CharacterData00::toLowerCase (3463 bytes)

      Stack: [0x000000c5ac500000,0x000000c5ac600000], sp=0x000000c5ac5fe358, free space=1016k
      Native frames: (J=compiled Java code, j=interpreted, Vv=VM code, C=native code)
      V [jvm.dll+0x6da990] Method::is_method_handle_intrinsic+0x0 (method.cpp:1394)


      siginfo: EXCEPTION_ACCESS_VIOLATION (0xc0000005), reading address 0xffffffffffffffff


      Registers:
      RAX=0x0000000000000000, RBX=0x000002b41361b500, RCX=0x636f6c5f61746144, RDX=0x000002b400b98b08
      RSP=0x000000c5ac5fe358, RBP=0x0000000000000000, RSI=0x000002b41361b500, RDI=0x0000000000000002
      R8 =0x0000000000000000, R9 =0x0000000000000002, R10=0x000002b46d7fa9b0, R11=0x000000c5ac5fe410
      R12=0x000002b47b151fb0, R13=0x0000000000000000, R14=0x000000c5ac5fe410, R15=0x0000000000003af0
      RIP=0x00007ff90c60a990, EFLAGS=0x0000000000010206

      XMM[0]=0x0000000000000000 0x0000000000000000
      XMM[1]=0x0000000000000000 0x00000000ffffffff
      XMM[2]=0x310c480dff327c01 0x300e380578013105
      XMM[3]=0x601b601b601b601b 0x601b601b601b601b
      XMM[4]=0x601b601b601b601b 0x601b601b601b601b
      XMM[5]=0x0000000000000000 0x000000200000371b
      XMM[6]=0x0000000000000000 0x0000000000000000
      XMM[7]=0x0000000000000000 0x0000000000000000
      XMM[8]=0x0000000000000000 0x0000000000000000
      XMM[9]=0x0000000000000000 0x0000000000000000
      XMM[10]=0x0000000000000000 0x0000000000000000
      XMM[11]=0x0000000000000000 0x0000000000000000
      XMM[12]=0x0000000000000000 0x0000000000000000
      XMM[13]=0x0000000000000000 0x0000000000000000
      XMM[14]=0x0000000000000000 0x0000000000000000
      XMM[15]=0x0000000000000000 0x0000000000000000
        MXCSR=0x00001fa0


      Register to memory mapping:

      RAX=0x0 is null
      RBX=0x000002b41361b500 points into unknown readable memory: 0x0000000000000000 | 00 00 00 00 00 00 00 00
      RCX=0x636f6c5f61746144 is an unknown value
      RDX=0x000002b400b98b08 is at entry_point+-842 in (nmethod*)0x000002b400b98b08
      Compiled method (c1) 146224 6853 3 java.lang.CharacterData00::toLowerCase (3463 bytes)
       total in heap [0x000002b400b98b08,0x000002b400b9c5f8] = 15088
       relocation [0x000002b400b98be0,0x000002b400b98e28] = 584
       main code [0x000002b400b98e40,0x000002b400b9c5a0] = 14176
       stub code [0x000002b400b9c5a0,0x000002b400b9c5e8] = 72
       metadata [0x000002b400b9c5e8,0x000002b400b9c5f8] = 16
       immutable data [0x000002b415c77760,0x000002b415c777d0] = 112
       dependencies [0x000002b415c77760,0x000002b415c77768] = 8
       scopes pcs [0x000002b415c77768,0x000002b415c777a8] = 64
       scopes data [0x000002b415c777a8,0x000002b415c777d0] = 40
      RSP=0x000000c5ac5fe358 is pointing into the stack for thread: 0x000002b47b14ff10
      RBP=0x0 is null
      RSI=0x000002b41361b500 points into unknown readable memory: 0x0000000000000000 | 00 00 00 00 00 00 00 00
      RDI=0x0000000000000002 is an unknown value
      R8 =0x0 is null
      R9 =0x0000000000000002 is an unknown value
      R10=0x000002b46d7fa9b0 points into unknown readable memory: 0x000002b46e7992e0 | e0 92 79 6e b4 02 00 00
      R11=0x000000c5ac5fe410 is pointing into the stack for thread: 0x000002b47b14ff10
      R12=0x000002b47b151fb0 points into unknown readable memory: 0x000002b413e81da8 | a8 1d e8 13 b4 02 00 00
      R13=0x0 is null
      R14=0x000000c5ac5fe410 is pointing into the stack for thread: 0x000002b47b14ff10
      R15=0x0000000000003af0 is an unknown value

      -------------------------------------------

      case 2:

      #
      # A fatal error has been detected by the Java Runtime Environment:
      #
      # EXCEPTION_ACCESS_VIOLATION (0xc0000005) at pc=0x00007fffb16f233a, pid=8732, tid=36664
      #
      # JRE version: Java(TM) SE Runtime Environment (24.0+27) (build 24-ea+27-3418)
      # Java VM: Java HotSpot(TM) 64-Bit Server VM (24-ea+27-3418, mixed mode, tiered, compressed oops, compressed class ptrs, g1 gc, windows-amd64)
      # Problematic frame:
      # V [jvm.dll+0x70233a] nmethod::is_unloading+0xa
      #
      # Core dump will be written. Default location: C:\sb\prod\1733172954\testoutput\test-support\jtreg_open_test_jdk_tier2_part2\scratch\2\hs_err_pid8732.mdmp
      #
      # If you would like to submit a bug report, please visit:
      # https://bugreport.java.com/bugreport/crash.jsp
      #

      --------------- S U M M A R Y ------------

      Command Line: -Xmx768m -XX:MaxRAMPercentage=4.16667 -Dtest.boot.jdk=c:\ade\mesos\work_dir\jib-master\install\jdk\23\37\bundles\windows-x64\jdk-23_windows-x64_bin.zip\jdk-23 -Djava.io.tmpdir=c:\sb\prod\1733172954\testoutput\test-support\jtreg_open_test_jdk_tier2_part2\tmp -XX:+CreateCoredumpOnCrash -ea -esa -Djava.library.path=c:\ade\mesos\work_dir\jib-master\install\jdk-24+27-3418\windows-x64.test\jdk\jtreg\native --patch-module=java.base=C:\sb\prod\1733172954\testoutput\test-support\jtreg_open_test_jdk_tier2_part2\patches\java.base -Djava.security.policy=file:/c:/sb/prod/1733172954/testoutput/test-support/jtreg_open_test_jdk_tier2_part2/jtreg.policy com.sun.javatest.regtest.agent.AgentServer -id 25 -logfile C:\sb\prod\1733172954\testoutput\test-support\jtreg_open_test_jdk_tier2_part2\jtData\agentServer.25.trace -allowSetSecurityManager -port 55604 -timeoutFactor 4.0

      Host: AMD EPYC 7J13 64-Core Processor , 12 cores, 23G, Windows 11 , 64 bit Build 22621 (10.0.22621.3527)
      Time: Mon Dec 2 21:07:22 2024 Etc elapsed time: 144.729009 seconds (0d 0h 2m 24s)

      --------------- T H R E A D ---------------

      Current thread (0x0000011a27e58850): JavaThread "C1 CompilerThread0" daemon [_thread_in_vm, id=36664, stack(0x00000008e9f00000,0x00000008ea000000) (1024K)]


      Current CompileTask:
      C1:144729 6223 3 java.lang.CharacterData00::toUpperCase (3484 bytes)

      Stack: [0x00000008e9f00000,0x00000008ea000000], sp=0x00000008e9ffe790, free space=1017k
      Native frames: (J=compiled Java code, j=interpreted, Vv=VM code, C=native code)
      V [jvm.dll+0x70233a] nmethod::is_unloading+0xa (nmethod.cpp:2364)
      V [jvm.dll+0x2bfbbe] DependencyContext::add_dependent_nmethod+0x4e (dependencyContext.cpp:95)
      V [jvm.dll+0x3fa836] InstanceKlass::add_dependent_nmethod+0x26 (instanceKlass.cpp:2497)
      V [jvm.dll+0x703a8b] nmethod::new_nmethod+0x39b (nmethod.cpp:1197)
      V [jvm.dll+0x20fe91] ciEnv::register_method+0x421 (ciEnv.cpp:1074)
      V [jvm.dll+0x1718d6] Compilation::compile_method+0x316 (c1_Compilation.cpp:488)
      V [jvm.dll+0x170b6c] Compilation::Compilation+0x20c (c1_Compilation.cpp:609)
      V [jvm.dll+0x17298d] Compiler::compile_method+0xdd (c1_Compiler.cpp:264)
      V [jvm.dll+0x27dfdb] CompileBroker::invoke_compiler_on_method+0x7fb (compileBroker.cpp:2322)
      V [jvm.dll+0x27c27a] CompileBroker::compiler_thread_loop+0x26a (compileBroker.cpp:1978)
      V [jvm.dll+0x42edb6] JavaThread::run+0x116 (javaThread.cpp:757)
      V [jvm.dll+0x87ce6b] Thread::call_run+0xcb (thread.cpp:242)
      V [jvm.dll+0x72e535] thread_native_entry+0x95 (os_windows.cpp:545)
      C [ucrtbase.dll+0x29333] (no source info available)
      C [KERNEL32.DLL+0x1257d] (no source info available)
      C [ntdll.dll+0x5aa48] (no source info available)


      siginfo: EXCEPTION_ACCESS_VIOLATION (0xc0000005), reading address 0xffffffffffffffff

            bpb Brian Burkhalter
            dholmes David Holmes
            Votes:
            0 Vote for this issue
            Watchers:
            4 Start watching this issue

              Created:
              Updated:
              Resolved: